head	1.3;
access;
symbols
	pkgsrc-2013Q2:1.3.0.2
	pkgsrc-2013Q2-base:1.3
	pkgsrc-2013Q1:1.2.0.4
	pkgsrc-2013Q1-base:1.2
	pkgsrc-2012Q4:1.2.0.2
	pkgsrc-2012Q4-base:1.2
	pkgsrc-2012Q3:1.1.0.2
	pkgsrc-2012Q3-base:1.1;
locks; strict;
comment	@# @;


1.3
date	2013.05.20.06.21.22;	author adam;	state dead;
branches;
next	1.2;
commitid	Pd8RFu1gDLQ9NkQw;

1.2
date	2012.10.20.22.59.30;	author pettai;	state Exp;
branches;
next	1.1;

1.1
date	2012.09.16.20.29.06;	author pettai;	state Exp;
branches;
next	;


desc
@@


1.3
log
@Nmap 6.25:
o [NSE] Added CPE to smb-os-discovery output.
o [Ncat] Fixed the printing of warning messages for large arguments to
  the -i and -w options.
o [Ncat] Shut down the write part of connected sockets in listen mode
  when stdin hits EOF, just as was already done in connect mode.
o [Zenmap] Removed a crashing error that could happen when canceling a
  "Print to File" on Windows:
  Traceback (most recent call last):
    File "zenmapGUI\MainWindow.pyo", line 831, in _print_cb
    File "zenmapGUI\Print.pyo", line 156, in run_print_operation
  GError: Error from StartDoc
o [NSE] Added new fingerprints for http-enum: Sitecore, Moodle, typo3,
  SquirrelMail, RoundCube.
o Added some new checks for failed library calls.
@
text
@$NetBSD: patch-an,v 1.2 2012/10/20 22:59:30 pettai Exp $

Fix for sa_len size problem on NetBSD
(See commit r29739 in nmap's svn for details)

Fix (build) for Solaris 10
(See commit r29672 in nmap's svn or PR pkg/47033)

--- libdnet-stripped/src/intf.c.orig	2012-05-24 03:59:25.000000000 +0000
+++ libdnet-stripped/src/intf.c
@@@@ -64,9 +64,10 @@@@
 #endif
 
 #ifdef HAVE_SOCKADDR_SA_LEN
-# define NEXTIFR(i)	((struct ifreq *)((u_char *)&i->ifr_addr + \
-				(i->ifr_addr.sa_len ? i->ifr_addr.sa_len : \
-				 sizeof(i->ifr_addr))))
+# define max(a, b) ((a) > (b) ? (a) : (b))
+# define NEXTIFR(i)	((struct ifreq *) \
+				max((u_char *)i + sizeof(struct ifreq), \
+				(u_char *)&i->ifr_addr + i->ifr_addr.sa_len))
 #else
 # define NEXTIFR(i)	(i + 1)
 #endif
@@@@ -954,9 +955,11 @@@@ intf_loop(intf_t *intf, intf_handler cal
 			;
 		else
 			return (-1);
+#ifdef IFF_IPMP
 		if (lifr->lifr_flags & IFF_IPMP) {
 			continue;
 		}
+#endif
 		
 		if (_intf_get_noalias(intf, entry) < 0)
 			return (-1);
@


1.2
log
@Added build fix for Solaris 10, as suggested by PR pkg/47033
@
text
@d1 1
a1 1
$NetBSD: patch-an,v 1.1 2012/09/16 20:29:06 pettai Exp $
@


1.1
log
@From the release announcement on http://nmap.org:

"The Nmap Project is pleased to announce the immediate, free availability
 of the Nmap Security Scanner version 6.00 from http://nmap.org/.
 It is the product of almost three years of work, 3,924 code commits,
 and more than a dozen point releases since the big Nmap 5 release in July
 2009. Nmap 6 includes a more powerful Nmap Scripting Engine, 289 new scripts,
 better web scanning, full IPv6 support, the Nping packet prober, faster scans,  and much more! We recommend that all current users upgrade."

Here is a condensed Changelog:

Nmap 6.01 [2012-06-13]

o [Zenmap] Fixed a hang that would occur on Mac OS X 10.7.

o [Zenmap] Fixed a crash that happened when activating the host filter.

o Fixed a bug that caused Nmap to fail to find any network interface when
  at least one of them is in the monitor mode.
  http://seclists.org/nmap-dev/2012/q2/449
  http://seclists.org/nmap-dev/2012/q2/478

o Fixed the greppable output of hosts that time-out.

Nmap 6.00 [2012-05-21]

o Most important release since Nmap 5.00 in July 2009! For a list of
  the most significant improvements and new features, see the
  announcement at: http://nmap.org/6

o Some XML output improvements...

o Lots of NSE scripts added and updated...

o Fixed the routing table loop on OS X so that on-link routes appear.

o Upgraded included libpcap to version 1.2.1.

o Fixed a compilation problem on Solaris 9 caused by a missing
  definition of IPV6_V6ONLY.

o Setting --min-parallelism by itself no longer forces the maximum
  parallelism to the same value.

o [Zenmap] Fixed a crash that would happen in the profile editor when
  the script.db file doesn't exist.

o [Zenmap] It is now possible to compare scans having the same name or
  command line parameters.

o Fixed an error that could occur with ICMPv6 probes and -d4 debugging:
  "Unexpected probespec2ascii type encountered"

o Applied a workaround to make pcap captures work better on Solaris 10.

o Fixed a bug that could cause Nsock timers to fire too early.

o Changed the way timeout calculations are made in the IPv6 OS engine.

Nmap 5.61TEST5 [2012-03-09]

o Integrated all of your IPv4 OS fingerprint submissions since June
  2011 (about 1,900 of them).  Added about 256 new fingerprints (and
  deleted some bogus ones), bringing the new total to 3,572.
  Additions include Apple iOS 5.01, OpenBSD 4.9 and 5.0, FreeBSD 7.0
  through 9.0-PRERELEASE, and a ton of new WAPs, routers, and other
  devices. Many existing fingerprints were improved. For more details,
  see http://seclists.org/nmap-dev/2012/q1/431

o Integrated all of your service/version detection fingerprints
  submitted since November 2010--more than 2,500 of them!  Our
  signature count increased more than 10% to 7,423 covering 862
  protocols. Some amusing and bizarre new services are described at
  http://seclists.org/nmap-dev/2012/q1/359

o Integrated your latest IPv6 OS submissions and corrections. We're
  still low on IPv6 fingerprints, so please scan any IPv6 systems you
  own or administer and submit them to http://nmap.org/submit/.  Both
  new fingerprints (if Nmap doesn't find a good match) and corrections
  (if Nmap guesses wrong) are useful.

o IPv6 OS detection now includes a novelty detection system which
  avoids printing a match when an observed fingerprint is too
  different from fingerprints seen before. As the OS database is still
  small, this helps to avoid making (essentially) wild guesses when
  seeing a new operating system.

o Refactored the nsock library to add the nsock-engines system.

o [NSE] Added 43(!) NSE scripts, bringing the total up to 340.

o CPE (Common Platform Enumeration) OS classification is now supported
  for IPv6 OS detection.

[...]

Nmap 5.61TEST4 [2012-01-02] -> Nmap 5.61TEST1

[...]

Lots of Bugfixes!

Thanks to jschauma@@ for analysing a NetBSD related problem,
and to David Fifield for providing the (upstream) patch.
@
text
@d1 1
a1 1
$NetBSD$
d6 3
d25 12
@

